CIPT Flashcards
(279 cards)
Accountability
The introduction of technical and organizational measures for appropriate handling of personal data according to the law, which is an idea mentioned in GDPR and the Fair Information Practice Principles.
Abstract
To restrict the level of detail shared when processing personal information.
Access control entry
An element that governs, oversees, or rec-ords access to an object by an identified user in an access control list.
Access control list
A list of access control entries that correspond to an object. This could be either discretionary, meaning controlling access, or system, meaning monitoring ac-cess via security event log or audit trail.
Active Data Collection
When an end user purposely provides information, usually through web forms, text boxes, check boxes, or radio buttons.
AdChoices
A Digital Advertising Alliance program that pro-motes awareness and choice for online adver-tising. Participating DAA members’ websites need an icon near their advertisements or the bottom of their pages. Users set preferences for behavioral advertising by clicking on the icon.
Adequate level of protection
Confirmation that a data transfer accounts for the rule of law and legislation, respect for human rights, data protection rules, professional rules and security measures, data subject rights, independent supervi-sory authorities, and any international commitments.
Advanced encryption standard
An encryption algorithm that the US government us-es for security sensitive non-classified material. NIST selected this algorithm in 2001 to replace the Data Encryption Standard (DES).
Adverse action
Any business, credit, or employment action that affects consumers negatively, such as denying or can-celing credit, insurance, employment, or promotion. A credit transaction where the consumer accepts a counteroffer would not count.
Agile development model
As opposed to the plan-driven development model, this process for software system and product design integrates new system requirements during the literal creation of the system, where specific portions are developed one at a time. The Scrum Model is one ex-ample.
Algorithm
A mathematical instruction applied to a set of data.
Anonymization
The process by which individually identifiable data is changed so that it can no longer be related back to any individual without affecting the usability of the data.
Anonymous information
Data that is not related to an identified or an identifi-able natural person, nor can it be combined with oth-er information to re-identify persons. Being made un-identifiable, it is not in scope for the GDPR.
Anthropomorphism
The act of placing human characteristics or behaviors on non-living things.
Anti-discrimination laws
Indications of special classes of personal data. If these exist based on a class or status, it is likely that the personal information is subject to more prescrip-tive data protection regulation.
Application or field encryption
The ability to encrypt certain regions of data, particu-larly sensitive data including health-related infor-mation.
Application-layer attacks
Attacks that take advantage of flaws in network server applications, which are present in applications such as web browsers, e-mail server software, and network routing software. Patches and updates to applications can help protect against such attacks.
Appropriation
Adopting one identity for another person’s uses.
Asymmetric encryption
A type of data encryption using two distinct but relat-ed keys to encrypt data: a public key for other par-ties, and a private key only for the first party. You need both keys to decrypt the data.
Attribute-based access control
A permission model for access control made by review-ing attributes given to users, data, and the context of requested access.
Audit trail
A track or record of electronic activity used for mon-itoring or validation in tracking customer activity or investigating cybercrimes.
Authentication
Determining whether an entity is who it claims to be.
Authorization
The process for deciding if the user should have access to a specific resource like an information asset or sys-tem containing and validating the identity of the user. The criteria could include things like organizational role, security clearance, and applicable law.
Automated decision making
The process of making a determination apart from human involvement.